Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Computer Science

Authors and titles for April 2010

Total of 773 entries : 1-100 101-200 201-300 301-400 ... 701-773
Showing up to 100 entries per page: fewer | more | all
[1] arXiv:1004.0023 [pdf, other]
Title: High-Performance Physics Simulations Using Multi-Core CPUs and GPGPUs in a Volunteer Computing Context
Kamran Karimi, Neil G. Dickson, Firas Hamze
Comments: 15 pages, 9 figures, 3 tables. Accepted in the International Journal of High Performance Computing Applications
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Performance (cs.PF); Computational Physics (physics.comp-ph)
[2] arXiv:1004.0024 [pdf, other]
Title: Importance of Explicit Vectorization for CPU and GPU Software Performance
Neil G. Dickson, Kamran Karimi, Firas Hamze
Comments: 17 pages, 17 figures
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Performance (cs.PF); Computational Physics (physics.comp-ph)
[3] arXiv:1004.0027 [pdf, other]
Title: Interference in Lattice Networks
Martin Haenggi
Comments: 17 pages, 10 figures. Submitted to IEEE Trans. Comm.
Subjects: Information Theory (cs.IT)
[4] arXiv:1004.0033 [pdf, other]
Title: Mixed Operators in Compressed Sensing
Matthew A. Herman, Deanna Needell
Comments: CISS 2010 (44th Annual Conference on Information Sciences and Systems)
Subjects: Numerical Analysis (math.NA)
[5] arXiv:1004.0048 [pdf, other]
Title: Anonimos: An LP based Approach for Anonymizing Weighted Social Network Graphs
Sudipto Das, Omer Egecioglu, Amr El Abbadi
Comments: 15 pages.
Subjects: Databases (cs.DB)
[6] arXiv:1004.0050 [pdf, other]
Title: A Study of Bandwidth-Perception Management Mechanisms in IEEE 802.16 Networks
Andres Arcia-Moret, Yubo Yang, Nicolas Montavont, David Ros
Comments: 10 pages, 20 figs.
Subjects: Networking and Internet Architecture (cs.NI)
[7] arXiv:1004.0056 [pdf, other]
Title: A Characterization of Combined Traces Using Labeled Stratified Order Structures
Dai Tri Man Le
Comments: 22 pages, preliminary version, some typos fixed.
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Formal Languages and Automata Theory (cs.FL)
[8] arXiv:1004.0062 [pdf, other]
Title: Quantitative Information Flow - Verification Hardness and Possibilities
Hirotoshi Yasuoka, Tachio Terauchi,
Comments: To appear in Computer Security Foundations 2010
Subjects: Cryptography and Security (cs.CR)
[9] arXiv:1004.0084 [pdf, other]
Title: A New Proof for the Correctness of F5 (F5-Like) Algorithm
Yao Sun, Dingkang Wang
Subjects: Symbolic Computation (cs.SC)
[10] arXiv:1004.0085 [pdf, other]
Title: A stochastic model of human visual attention with a dynamic Bayesian network
Akisato kimura, Derek Pang, Tatsuto Takeuchi, Kouji Miyazato, Junji Yamato, Kunio Kashino
Comments: 24 pages, single-column, 13 figures excluding portlaits, submitted to IEEE Transactions on Pattern Analysis and Machine Intelligence.
Subjects: Computer Vision and Pattern Recognition (cs.CV); Multimedia (cs.MM); Neural and Evolutionary Computing (cs.NE); Machine Learning (stat.ML)
[11] arXiv:1004.0092 [pdf, other]
Title: Maximal Intersection Queries in Randomized Input Models
Benjamin Hoffmann, Mikhail Lifshits, Yury Lifshits, Dirk Nowotka
Comments: 18 pages
Journal-ref: Theory of Computing Systems, 46(1):104-119, 2010
Subjects: Information Retrieval (cs.IR)
[12] arXiv:1004.0105 [pdf, other]
Title: Optimal Direct Sum Results for Deterministic and Randomized Decision Tree Complexity
Rahul Jain, Hartmut Klauck, Miklos Santha
Comments: 7 pages
Subjects: Computational Complexity (cs.CC); Quantum Physics (quant-ph)
[13] arXiv:1004.0152 [pdf, other]
Title: Opportunistic Routing in Ad Hoc Networks: How many relays should there be? What rate should nodes use?
Joseph Blomer, Nihar Jindal
Comments: 5 pages, 8 figures, Submitted to IEEE GLOBECOM 2010
Subjects: Networking and Internet Architecture (cs.NI)
[14] arXiv:1004.0180 [pdf, other]
Title: Precoded Turbo Equalizer for Power Line Communication Systems
Kai Xie, Jing (Tiffany)Li
Subjects: Information Theory (cs.IT)
[15] arXiv:1004.0200 [pdf, other]
Title: An Algorithm for Finding Positive Solutions to Polynomial Equations
Dustin Cartwright
Comments: 9 pages
Subjects: Numerical Analysis (math.NA)
[16] arXiv:1004.0202 [pdf, other]
Title: Interval Slopes as Numerical Abstract Domain for Floating-Point Variables
Alexandre Chapoutot (LIP6)
Subjects: Programming Languages (cs.PL); Numerical Analysis (math.NA)
[17] arXiv:1004.0204 [pdf, other]
Title: Radio Interface for High Data Rate Wireless Sensor Networks
Julien Henaut (LAAS), Aubin Lecointre (LAAS), Daniela Dragomirescu (LAAS), Robert Plana (LAAS)
Journal-ref: International Conference on Computing, Communications and Control Technologies, Orlando, Fl : \'Etats-Unis d'Am\'erique (2008)
Subjects: Networking and Internet Architecture (cs.NI)
[18] arXiv:1004.0208 [pdf, other]
Title: Delay-rate tradeoff in ergodic interference alignment
Oliver Johnson, Matthew Aldridge, Robert Piechocki
Comments: Extended version of a paper presented at the 2012 International Symposium on Information Theory. 7 pages, 1 figure
Journal-ref: 2012 IEEE International Symposium on Information Theory Proceedings, 2626-2630 (shorter conference version)
Subjects: Information Theory (cs.IT); Probability (math.PR)
[19] arXiv:1004.0243 [pdf, other]
Title: Psychophysiological Correlations with Gameplay Experience Dimensions
Anders Drachen, Lennart E. Nacke, Georgios Yannakakis, Anja Lee Pedersen
Comments: CHI 2010 Workshop: Brain, Body, and Bytes
Subjects: Human-Computer Interaction (cs.HC); Multimedia (cs.MM)
[20] arXiv:1004.0248 [pdf, other]
Title: Affective Ludology, Flow and Immersion in a First- Person Shooter: Measurement of Player Experience
Lennart E. Nacke, Craig A. Lindley
Comments: 21 pages
Journal-ref: Loading...: The Journal of the Canadian Game Studies Association. Vol 3, No 5 (2009)
Subjects: Human-Computer Interaction (cs.HC); Multimedia (cs.MM)
[21] arXiv:1004.0256 [pdf, other]
Title: From Playability to a Hierarchical Game Usability Model
Lennart E. Nacke
Comments: 2 pages, 1 figure
Subjects: Human-Computer Interaction (cs.HC); Multimedia (cs.MM)
[22] arXiv:1004.0258 [pdf, other]
Title: Trends and Techniques in Visual Gaze Analysis
Sophie Stellmach, Lennart E. Nacke, Raimund Dachselt, Craig A. Lindley
Comments: pages 89-93, The 5th Conference on Communication by Gaze Interaction - COGAIN 2009: Gaze Interaction For Those Who Want It Most, ISBN: 978-87-643-0475-6
Subjects: Human-Computer Interaction (cs.HC); Computer Vision and Pattern Recognition (cs.CV); Graphics (cs.GR); Multimedia (cs.MM)
[23] arXiv:1004.0259 [pdf, other]
Title: Gameplay experience in a gaze interaction game
Lennart E. Nacke, Sophie Stellmach, Dennis Sasse, Craig A. Lindley
Comments: pages 49-54, The 5th Conference on Communication by Gaze Interaction - COGAIN 2009: Gaze Interaction For Those Who Want It Most, ISBN: 978-87-643-0475-6
Subjects: Human-Computer Interaction (cs.HC); Multimedia (cs.MM)
[24] arXiv:1004.0263 [pdf, other]
Title: On Memory Accelerated Signal Processing within Software Defined Radios
Vincenzo Pellegrini, Luca Rose, Mario Di Dio
Subjects: Networking and Internet Architecture (cs.NI); Performance (cs.PF)
[25] arXiv:1004.0269 [pdf, other]
Title: The Degraded Poisson Wiretap Channel
Amine Laourine, Aaron B. Wagner
Comments: 29 pages, submitted to IEEE Transactions on Information Theory.
Subjects: Information Theory (cs.IT)
[26] arXiv:1004.0313 [pdf, other]
Title: A hybrid decision approach for the association problem in heterogeneous networks
Salah Eddine Elayoubi, Eitan Altman, Majed Haddad, Zwi Altman
Comments: 5 pages, 4 figures, IEEE Infocom, San Diego, USA, March 2010.
Subjects: Computer Science and Game Theory (cs.GT); Networking and Internet Architecture (cs.NI)
[27] arXiv:1004.0334 [pdf, other]
Title: Approximation Algorithms for Campaign Management
Edith Elkind, Piotr Faliszewski
Comments: 19 pages
Subjects: Computer Science and Game Theory (cs.GT); Data Structures and Algorithms (cs.DS)
[28] arXiv:1004.0346 [pdf, other]
Title: Network Code Design for Orthogonal Two-hop Network with Broadcasting Relay: A Joint Source-Channel-Network Coding Approach
Roghayeh Joda, Farshad Lahouti
Comments: 27 pages, 9 figures, Submited to IEEE Transaction on Communication
Subjects: Information Theory (cs.IT)
[29] arXiv:1004.0351 [pdf, other]
Title: An Oblivious Spanning Tree for Buy-at-Bulk Network Design Problems
Srivathsan Srinivasagopalan, Costas Busch, S.S. Iyengar
Subjects: Data Structures and Algorithms (cs.DS)
[30] arXiv:1004.0357 [pdf, other]
Title: Reduced basis techniques for stochastic problems
Sébastien Boyaval, Claude Le Bris, Tony Lelièvre, Yvon Maday, Ngoc Cuong Nguyen, Anthony T. Patera
Subjects: Numerical Analysis (math.NA)
[31] arXiv:1004.0366 [pdf, other]
Title: Dense Error-Correcting Codes in the Lee Metric
Tuvi Etzion, Alexander Vardy, Eitan Yaakobi
Subjects: Information Theory (cs.IT)
[32] arXiv:1004.0367 [pdf, other]
Title: A Spatial Crypto Technique for Secure Data Transmission
Sk. Sarif Hassan, Pabitra Pal Choudhury, Sugata Sanyal
Subjects: Cryptography and Security (cs.CR)
[33] arXiv:1004.0378 [pdf, other]
Title: Facial Expression Representation and Recognition Using 2DHLDA, Gabor Wavelets, and Ensemble Learning
Mahmoud Khademi, Mohammad H. Kiapour, Mehran Safayani, Mohammad T. Manzuri, M. Shojaei
Comments: This paper has been withdrawn by the author due to an error in experimental results
Subjects: Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[34] arXiv:1004.0381 [pdf, other]
Title: Gossip and Distributed Kalman Filtering: Weak Consensus under Weak Detectability
Soummya Kar, José M. F. Moura
Comments: Submitted to the IEEE Transactions, 30 pages.
Subjects: Information Theory (cs.IT); Dynamical Systems (math.DS); Optimization and Control (math.OC); Probability (math.PR)
[35] arXiv:1004.0382 [pdf, other]
Title: Multigrid preconditioning of linear systems for interior point methods applied to a class of box-constrained optimal control problems
Andrei Draganescu, Cosmin Petra
Comments: 29 pages, 8 figures
Subjects: Numerical Analysis (math.NA); Systems and Control (eess.SY); Optimization and Control (math.OC)
[36] arXiv:1004.0383 [pdf, other]
Title: Multiuser Diversity Gain in Cognitive Networks
Ali Tajer, Xiaodong Wang
Comments: 32 pages, 3 figures, to appear in the IEEE/ACM Transactions on Networking
Subjects: Information Theory (cs.IT)
[37] arXiv:1004.0393 [pdf, other]
Title: Object-image correspondence for curves under finite and affine cameras
Joseph M. Burdis, Irina A. Kogan
Comments: 19 pages, 2 figures. This version considers the case of rational algebraic curves
Subjects: Computer Vision and Pattern Recognition (cs.CV); Algebraic Geometry (math.AG)
[38] arXiv:1004.0395 [pdf, other]
Title: Estimating Self-Sustainability in Peer-to-Peer Swarming Systems
Daniel S. Menasche, Antonio A. A. Rocha, Edmundo A. de Souza e Silva, Rosa M. Leao, Don Towsley, Arun Venkataramani
Comments: 27 pages, 5 figures
Journal-ref: Performance Evaluation, 67(11), 1243-1258 (2010)
Subjects: Networking and Internet Architecture (cs.NI); Performance (cs.PF)
[39] arXiv:1004.0400 [pdf, other]
Title: A new bound for the capacity of the deletion channel with high deletion probabilities
Marco Dalai
Comments: ISIT 2011, the first draft contained an error in some expressions (a log(n) in place of log(n+1))
Subjects: Information Theory (cs.IT)
[40] arXiv:1004.0402 [pdf, other]
Title: Improved Sparse Recovery Thresholds with Two-Step Reweighted $\ell_1$ Minimization
M. Amin Khajehnejad, Weiyu Xu, Salman Avestimehr, Babak Hassibi
Comments: accepted in ISIT 2010
Subjects: Information Theory (cs.IT)
[41] arXiv:1004.0403 [pdf, other]
Title: CONCISE: Compressed 'n' Composable Integer Set
Alessandro Colantonio, Roberto Di Pietro
Comments: Preprint submitted to Information Processing Letters, 7 pages
Subjects: Data Structures and Algorithms (cs.DS)
[42] arXiv:1004.0421 [pdf, other]
Title: A Faster Routing Scheme for Stationary Wireless Sensor Networks - A Hybrid Approach
Jasmine Norman (1), J.Paulraj Joseph (2), P.Prapoorna Roja (3) ((1)Measi Institute of Information Technology, India, (2)Manonmaniam Sundaranar University, India and (3)Jerusalem College of Engineering, India)
Comments: 10 pages
Journal-ref: International Journal of Ad hoc, Sensor & Ubiquitous Computing 1.1 (2010) 1-10
Subjects: Networking and Internet Architecture (cs.NI)
[43] arXiv:1004.0422 [pdf, other]
Title: Shadowing Effects on Routing Protocol of Multihop Ad Hoc Networks
Anwar Hossain, Mohammed Tarique, Rumana Islam, (American International University-Bangladesh)
Comments: 16 Pages
Journal-ref: International Journal of Ad hoc, Sensor & Ubiquitous Computing 1.1 (2010) 12-28
Subjects: Networking and Internet Architecture (cs.NI)
[44] arXiv:1004.0424 [pdf, other]
Title: Restricted Common Superstring and Restricted Common Supersequence
Raphaël Clifford, Zvi Gotthilf, Moshe Lewenstein, Alexandru Popa
Comments: Submitted to WAOA 2010
Subjects: Data Structures and Algorithms (cs.DS)
[45] arXiv:1004.0436 [pdf, other]
Title: On the parity complexity measures of Boolean functions
Zhiqiang Zhang, Yaoyun Shi
Comments: submitted to TCS on 16-MAR-2009
Subjects: Computational Complexity (cs.CC)
[46] arXiv:1004.0438 [pdf, other]
Title: User-driven applications
Sergey Andreyev
Comments: 33 pages, 11 figures
Subjects: Human-Computer Interaction (cs.HC)
[47] arXiv:1004.0459 [pdf, other]
Title: Embedding Secret Data in HTML Web Page
Sandipan Dey, Hameed Al-Qaheri, Sugata Sanyal
Comments: 10 Pages, 6 Figures, 2 Algorithms,1st International Conference on Image Processing and Communications, September 16-18, 2009, Bydgoszcz, Poland.
Journal-ref: Published in book: Image Processing & Communications Challenges, Ed. Ryszard S. Choras and Antoni Zabtudowski, Academy Publishing House EXIT, Warsaw 2009, pp. 474-481. ISBN: 978-83-60434-62-8.
Subjects: Cryptography and Security (cs.CR)
[48] arXiv:1004.0512 [pdf, other]
Title: Analysis, Interpretation, and Recognition of Facial Action Units and Expressions Using Neuro-Fuzzy Modeling
Mahmoud Khademi, Mohammad Hadi Kiapour, Mohammad T. Manzuri-Shalmani, Ali A. Kiaei
Journal-ref: LNAI vol. 5998, pp. 161--172, Springer, Heidelberg (Proc. of 4th IAPR Workshop on Artificial Neural Networks in Pattern Recognition), 2010.
Subjects: Computer Vision and Pattern Recognition (cs.CV)
[49] arXiv:1004.0514 [pdf, other]
Title: Superior Exploration-Exploitation Balance with Quantum-Inspired Hadamard Walks
Sisir Koppaka, Ashish Ranjan Hota
Comments: 2 pages, 2 figures, 1 table, late-breaking
Journal-ref: In Proceedings of the 12th annual conference companion on Genetic and evolutionary computation (GECCO '10). ACM, New York, NY, USA, 2093-2094
Subjects: Neural and Evolutionary Computing (cs.NE)
[50] arXiv:1004.0515 [pdf, other]
Title: Recognizing Combinations of Facial Action Units with Different Intensity Using a Mixture of Hidden Markov Models and Neural Network
Mahmoud Khademi, Mohammad T. Manzuri-Shalmani, Mohammad H. Kiapour, Ali A. Kiaei
Journal-ref: LNCS vol. 5997, pp. 304--313, Springer, Heidelberg (Proc. of 9th IAPR Workshop on Multiple Classifier Systems), 2010.
Subjects: Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[51] arXiv:1004.0517 [pdf, other]
Title: Multilinear Biased Discriminant Analysis: A Novel Method for Facial Action Unit Representation
Mahmoud Khademi, Mehran Safayani, Mohammad T. Manzuri-Shalmani
Comments: Proc. of 16th Korea-Japan Joint Workshop on Frontiers of Computer Vision, Hiroshima, Japan, 2010.
Subjects: Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[52] arXiv:1004.0526 [pdf, other]
Title: A New Lower Bound on the Maximum Number of Satisfied Clauses in Max-SAT and its Algorithmic Applications
R. Crowston, G. Gutin, M. Jones, A. Yeo
Subjects: Data Structures and Algorithms (cs.DS); Discrete Mathematics (cs.DM)
[53] arXiv:1004.0534 [pdf, other]
Title: Impact of Connection Admission Process on the Direct Retry Load Balancing Algorithm in Cellular Network
Przemysław Pawełczak, Shaunak Joshi, Sateesh Addepalli, John Villasenor, Danijela Čabrić
Comments: accepted to IEEE Transactions on Mobile Computing
Subjects: Networking and Internet Architecture (cs.NI); Information Theory (cs.IT); Performance (cs.PF)
[54] arXiv:1004.0542 [pdf, other]
Title: Cognitive Interference Management in Retransmission-Based Wireless Networks
Marco Levorato, Urbashi Mitra, Michele Zorzi
Comments: accepted for publication on Transactions on Information Theory
Subjects: Information Theory (cs.IT)
[55] arXiv:1004.0557 [pdf, other]
Title: Applications of Lindeberg Principle in Communications and Statistical Learning
Satish Babu Korada, Andrea Montanari
Comments: 18 pages
Subjects: Information Theory (cs.IT)
[56] arXiv:1004.0558 [pdf, other]
Title: Querying for the Largest Empty Geometric Object in a Desired Location
John Augustine, Sandip Das, Anil Maheshwari, Subhas Nandy, Sasanka Roy, Swami Sarvattomananda
Comments: This version is a significant update of our earlier submission arXiv:1004.0558v1. Apart from new variants studied in Sections 3 and 4, the results have been improved in Section this http URL note that the change in title and abstract indicate that we have expanded the scope of the problems we study
Subjects: Computational Geometry (cs.CG); Data Structures and Algorithms (cs.DS)
[57] arXiv:1004.0567 [pdf, other]
Title: Using Rough Set and Support Vector Machine for Network Intrusion Detection
Rung-Ching Chen, Kai-Fan Cheng, Chia-Fen Hsieh (Chaoyang University of Technology, Taiwan)
Comments: 13 Pages
Journal-ref: International Journal of Network Security & Its Applications 1.1 (2009) 1-13
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[58] arXiv:1004.0570 [pdf, other]
Title: Tools and techniques for Network Forensics
Natarajan Meghanathan, Sumanth Reddy Allam, Loretta A. Moore (Jackson State University)
Comments: 12Pages
Journal-ref: International Journal of Network Security & Its Applications 1.1 (2009) 14-25
Subjects: Networking and Internet Architecture (cs.NI)
[59] arXiv:1004.0571 [pdf, other]
Title: Encryption Quality Analysis and Security Evaluation of CAST-128 Algorithm and its Modified Version using Digital Images
G. N. Krishnamurthy, V. Ramaswamy ((1) Bapuji Institute of Engineering & Technology, India)
Comments: 6Pages
Journal-ref: International Journal of Network Security & Its Applications 1.1 (2009) 28-33
Subjects: Cryptography and Security (cs.CR)
[60] arXiv:1004.0574 [pdf, other]
Title: A Comparison between Memetic algorithm and Genetic algorithm for the cryptanalysis of Simplified Data Encryption Standard algorithm
Poonam Garg (Institute of Management Technology, India)
Comments: 9Pages
Journal-ref: International Journal of Network Security & Its Applications 1.1 (2009) 34-42
Subjects: Cryptography and Security (cs.CR); Neural and Evolutionary Computing (cs.NE)
[61] arXiv:1004.0587 [pdf, other]
Title: A New Cluster-based Wormhole Intrusion detection algorithm for Mobile Ad-Hoc Networks
Debdutta Barman Roy (1), Rituparna Chaki (2), Nabendu Chaki (3), ((1)Calcutta Institute of Engineering and Management, India, (2) West Bengal University of Technology, India, (3)University of Calcutta, A.P.C. Road, India)
Comments: 9Pages
Journal-ref: International Journal of Network Security & Its Applications 1.1 (2009) 44-52
Subjects: Networking and Internet Architecture (cs.NI)
[62] arXiv:1004.0590 [pdf, other]
Title: Iterative method for improvement of coding and decryption
Natasa Zivic, (University of Siegen, Germany)
Comments: 15Pages
Journal-ref: International Journal of Network Security & Its Applications 1.2 (2009) 1-15
Subjects: Cryptography and Security (cs.CR)
[63] arXiv:1004.0591 [pdf, other]
Title: A new key establishment scheme for wireless sensor networks
Eric Ke Wang, Lucas C.K.Hui, S.M.Yiu, (The University of Hong Kong, Hong Kong)
Comments: 11Pages
Journal-ref: International Journal of Network Security & Its Applications 1.2 (2009) 17-27
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[64] arXiv:1004.0594 [pdf, other]
Title: Dynamic IDP Signature processing by fast elimination using DFA
Mohammed Misbahuddin, Sachin Narayanan, Bishwa Ranjan Ghosh
Comments: 10Pages
Journal-ref: International Journal of Network Security & Its Applications 1.2 (2009) 29-38
Subjects: Cryptography and Security (cs.CR)
[65] arXiv:1004.0596 [pdf, other]
Title: Effect of Inter Packet Delay in performance analysis of coexistence heterogeneous Wireless Packet Networks
G.M.Tamilselvan, A.Shanmugam, (Bannariamman Institute of Technology, Tamilnadu, India)
Comments: 10Pages
Journal-ref: International Journal of Network Security & Its Applications 1.2 (2009) 40-49
Subjects: Networking and Internet Architecture (cs.NI)
[66] arXiv:1004.0598 [pdf, other]
Title: Clustered Hierarchy in Sensor Networks: Performance and Security
Mohammed Abuhelaleh, Khaled Elleithy, Thabet Mismar, (University of Bridgeport USA)
Comments: 12Pages
Journal-ref: International Journal of Network Security & Its Applications 1.2 (2009) 51-62
Subjects: Networking and Internet Architecture (cs.NI)
[67] arXiv:1004.0599 [pdf, other]
Title: Quantum Three-Pass protocol: Key distribution using quantum superposition states
Yoshito Kanamori (1), Seong-Moo Yoo (2), ((1)University of Alaska Anchorage, Alaska, USA, (2)The University of Alabama in Huntsville, Alabama, USA)
Comments: 7Pages
Journal-ref: International Journal of Network Security & Its Applications 1.2 (2009) 64-70
Subjects: Cryptography and Security (cs.CR)
[68] arXiv:1004.0602 [pdf, other]
Title: Intelligent Detection System framework using Mobile agents
N.Jaisankar (1), R.Saravanan (1), K. Durai Swamy (2), ((1)VIT University, India,(2)Dean, K.S.R.C.T., Tiruchengodu, India)
Comments: 17Pages
Journal-ref: International Journal of Network Security & Its Applications 1.2 (2009) 72-88
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[69] arXiv:1004.0604 [pdf, other]
Title: On Generation of Firewall Log Status Reporter (SRr) Using Perl
Sugam Sharma (1), Hari Cohly (2), Tzusheng Pei (2), ((1)Iowa State University, USA, (2) Jackson State University, USA)
Comments: 10Pages
Journal-ref: International Journal of Network Security & Its Applications 1.2 (2009) 90-99
Subjects: Software Engineering (cs.SE)
[70] arXiv:1004.0605 [pdf, other]
Title: Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction and Integration
Alan Mink, Sheila Frankel, Ray Perlner, ((NIST), USA)
Comments: 12Pages
Journal-ref: International Journal of Network Security & Its Applications 1.2 (2009) 101-112
Subjects: Cryptography and Security (cs.CR)
[71] arXiv:1004.0610 [pdf, other]
Title: The Isomorphism Problem for omega-Automatic Trees
Dietrich Kuske, Jiamou Liu, Markus Lohrey
Subjects: Logic in Computer Science (cs.LO); Formal Languages and Automata Theory (cs.FL)
[72] arXiv:1004.0646 [pdf, other]
Title: An introduction to SDE simulation
Simon J.A. Malham, Anke Wiese
Comments: 27 pages, 3 figures, review article
Subjects: Numerical Analysis (math.NA)
[73] arXiv:1004.0653 [pdf, other]
Title: Exact Ramsey Theory: Green-Tao numbers and SAT
Oliver Kullmann
Comments: 25 pages; a shortened version appears in LNCS (Springer), "Theory and Applications of Satisfiability Testing - SAT 2010", editors O. Strichman and S. Szeider. Revision contains new van-der-Waerden and Green-Tao numbers, especially "transversal numbers", corresponding to independence numbers of hypergraphs of arithmetic progressions. Some new comments discussing behaviour of vdW- and GT-numbers.
Journal-ref: Theory and Applications of Satisfiability Testing - SAT 2010, LNCS 6175, 352-362
Subjects: Discrete Mathematics (cs.DM); Data Structures and Algorithms (cs.DS)
[74] arXiv:1004.0658 [pdf, other]
Title: A new representation of Chaitin Ωnumber based on compressible strings
Kohtaro Tadaki
Comments: 12 pages, no figures, to appear in the Proceedings of the 9th International Conference on Unconventional Computation (UC 2010), The University of Tokyo, Japan, June 21-25, 2010
Journal-ref: Nat.Comput.11 (2012) 117-128
Subjects: Information Theory (cs.IT); Computational Complexity (cs.CC)
[75] arXiv:1004.0662 [pdf, other]
Title: Adaptive optimal regularization of the linear ill posed integral equations
E.Ostrovsky L.Sirota
Subjects: Numerical Analysis (math.NA); Statistics Theory (math.ST)
[76] arXiv:1004.0681 [pdf, other]
Title: Second order parameter-uniform convergence for a finite difference method for a singularly perturbed linear reaction-diffusion system
M.Paramasivam, S.Valarmathi, J.J.H.Miller
Subjects: Numerical Analysis (math.NA)
[77] arXiv:1004.0727 [pdf, other]
Title: Scalar-linear Solvability of Matroidal Networks Associated with Representable Matroids
Anthony Kim, Muriel Medard
Comments: 5 pages, submitted to IEEE ISIT 2010
Subjects: Information Theory (cs.IT)
[78] arXiv:1004.0728 [pdf, other]
Title: Effects of component-subscription network topology on large-scale data centre performance scaling
Ilango Sriram, Dave Cliff
Journal-ref: in: "Proceedings of the 15th IEEE International Conference on Engineering of Complex Computer Systems (ICECCS 2010)", R. Calinescu, R. Paige, M. Kwiatkowska (ed.); IEEE Computer Society, (2010), ISBN: 978-0-7695-4015-3; pp. 72 - 81
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC)
[79] arXiv:1004.0739 [pdf, other]
Title: Measuring and Synthesizing Systems in Probabilistic Environments
Krishnendu Chatterjee, Thomas A. Henzinger, Barbara Jobstmann, Rohit Singh
Comments: 29 pages
Subjects: Logic in Computer Science (cs.LO); Formal Languages and Automata Theory (cs.FL); Computer Science and Game Theory (cs.GT)
[80] arXiv:1004.0744 [pdf, other]
Title: Patrolling a Street Network is Strongly NP-Complete but in P for Tree Structures
Valentin E. Brimkov
Subjects: Computational Geometry (cs.CG); Computational Complexity (cs.CC); Discrete Mathematics (cs.DM); Data Structures and Algorithms (cs.DS); Combinatorics (math.CO)
[81] arXiv:1004.0755 [pdf, other]
Title: Extended Two-Dimensional PCA for Efficient Face Representation and Recognition
Mehran Safayani, Mohammad T. Manzuri-Shalmani, Mahmoud Khademi
Comments: Proc. of 4th International Conference on Intelligent Computer Communication and Processing (ICCP), Cluj-Napoca, Romania, pp. 295--298, 2008.
Subjects: Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[82] arXiv:1004.0759 [pdf, other]
Title: The Mystery of the Shape Parameter III
Lin-Tian Luh
Comments: 12 pages, 15 figures, experiment added
Subjects: Numerical Analysis (math.NA)
[83] arXiv:1004.0761 [pdf, other]
Title: The Mystery of the Shape Parameter IV
Lin-Tian Luh
Comments: 12 pages, 15 figures
Subjects: Numerical Analysis (math.NA)
[84] arXiv:1004.0762 [pdf, other]
Title: Integrating identity-based cryptography in IMS service authentication
Mohamed Abid, Songbo Song, Hassnaa Moustafa, Hossam Afifi (SudParis, Evry, France)
Comments: 13Pages
Journal-ref: International Journal of Network Security & Its Applications 1.3 (2009) 1-13
Subjects: Cryptography and Security (cs.CR); Multimedia (cs.MM)
[85] arXiv:1004.0765 [pdf, other]
Title: Agent Based Trust Management Model Based on Weight Value Model for Online Auctions
E.Sathiyamoorthy, N.Ch.Sriman Narayana Iyenger, V.Ramachandran (VIT University, India)
Comments: 17Pages
Journal-ref: International Journal of Network Security & Its Applications 1.3 (2009) 15-31
Subjects: Computer Science and Game Theory (cs.GT); Cryptography and Security (cs.CR)
[86] arXiv:1004.0766 [pdf, other]
Title: Text/Graphics Separation for Business Card Images for Mobile Devices
Ayatullah Faruk Mollah, Subhadip Basu, Mita Nasipuri, Dipak Kumar Basu
Comments: Proc. IAPR International Workshop on Graphics Recognition (2009) 263-270
Subjects: Graphics (cs.GR)
[87] arXiv:1004.0767 [pdf, other]
Title: Cryptanalysis of a more efficient and secure dynamic id-based remote user authentication scheme
Mohammed Aijaz Ahmed (1), D. Rajya Lakshmi (1), Sayed Abdul Sattar (2) ((1)GITAM University, Vishakapatnam,(2)J.N.T. University, Hyderabad)
Comments: 6Pages
Journal-ref: International Journal of Network Security & Its Applications 1.3 (2009) 32-37
Subjects: Cryptography and Security (cs.CR)
[88] arXiv:1004.0769 [pdf, other]
Title: PSIM: A tool for analysis of device pairing methods
Yasir Arfat Malkani, Lachhman Das Dhomeja (University of Sussex, Brighton, UK)
Comments: 12Pages
Journal-ref: International Journal of Network Security & Its Applications 1.3 (2009) 39-50
Subjects: Networking and Internet Architecture (cs.NI)
[89] arXiv:1004.0770 [pdf, other]
Title: Data security in mobile devices by geo locking
M Prabu Kumar, K Praneesh Kumar Yadav (VIT University, India)
Comments: 10Pages
Journal-ref: International Journal of Network Security & Its Applications 1.3 (2009) 52-61
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[90] arXiv:1004.0771 [pdf, other]
Title: Performance evaluation of a new route optimization technique for mobile IP
Moheb R Girgis, Tarek M Mahmoud, Youssef S Takroni, Hassan S Hassan (Minia University, Egypt)
Comments: 11Pages
Journal-ref: International Journal of Network Security & Its Applications 1.3 (2009) 63-73
Subjects: Networking and Internet Architecture (cs.NI)
[91] arXiv:1004.0772 [pdf, other]
Title: Security properties in an open peer-to-peer network
Jean-Francois Lalande, David Rodriguez, Christian Toinard (Ensi de Bourges, France)
Comments: 17Pages
Journal-ref: International Journal of Network Security & Its Applications 1.3 (2009) 73-89
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[92] arXiv:1004.0774 [pdf, other]
Title: A security framework for SOA applications in mobile environment
Johnneth Fonseca, Zair Abdelouahab, Denivaldo Lopes, Sofiane Labidi
Comments: 18Pages
Journal-ref: International Journal of Network Security & Its Applications 1.3 (2009) 90-107
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[93] arXiv:1004.0777 [pdf, other]
Title: Securing AODV for MANETs using Message Digest with Secret Key
Kamaljit Lakhtaria (1), Bhaskar N. Patel (2), Satish G. Prajapati (2), N. N. Jani (3), ((1) Rajkot Gujarat, India,(2) Ganpat Vidyanagar, Kherava, Gujarat, India,(3) Kadi Vishvadiva Vidyalaya (Deemed University), S K Patel Gandhinagar, India)
Comments: This article has been withdrawn by arXiv admins because it contains plagiarized content from International Conference on Computer Networks and Security (ICCNS 2008, September 27-28, 2008): "Securing AODV for MANETs using Message Digest with Secret Key", by Sunil J. Soni and Prashant B. Swadas
Subjects: Networking and Internet Architecture (cs.NI)
[94] arXiv:1004.0785 [pdf, other]
Title: Cost-Bandwidth Tradeoff In Distributed Storage Systems
Soroush Akhlaghi, Abbas Kiani, Mohammad Reza Ghanavati
Comments: 8 pages,8 figures
Subjects: Information Theory (cs.IT); Networking and Internet Architecture (cs.NI)
[95] arXiv:1004.0798 [pdf, other]
Title: Generalized Secure Distributed Source Coding with Side Information
Somayeh Salimi, Mahmoud Salmasizadeh, Mohammad Reza Aref
Subjects: Information Theory (cs.IT)
[96] arXiv:1004.0799 [pdf, other]
Title: Rate Regions of Secret Key Sharing in a New Source Model
Somayeh Salimi, Mahmoud Salmasizadeh, Mohammad Reza Aref
Subjects: Information Theory (cs.IT)
[97] arXiv:1004.0803 [pdf, other]
Title: From Holant To #CSP And Back: Dichotomy For Holant$^c$ Problems
Jin-Yi Cai, Sangxia Huang, Pinyan Lu
Subjects: Computational Complexity (cs.CC)
[98] arXiv:1004.0816 [pdf, other]
Title: Nepotistic Relationships in Twitter and their Impact on Rank Prestige Algorithms
Daniel Gayo-Avello
Comments: 40 pages, 17 tables, 14 figures. Paper has been restructured, new section "3.2. The importance of reciprocal linking in Twitter spam" was added, experiments with verified accounts in addition to spammers have bee conducted to show performance with relevant users and not only regarding spam demotion
Journal-ref: Information Processing & Management Volume 49, Issue 6, November 2013, Pages 1250-1280
Subjects: Information Retrieval (cs.IR)
[99] arXiv:1004.0817 [pdf, other]
Title: A Separation of NP and coNP in Multiparty Communication Complexity
Dmytro Gavinsky, Alexander A. Sherstov
Subjects: Computational Complexity (cs.CC)
[100] arXiv:1004.0838 [pdf, other]
Title: How powerful are integer-valued martingales?
Laurent Bienvenu, Frank Stephan, Jason Teutsch
Comments: Long version of the CiE 2010 paper.
Subjects: Computer Science and Game Theory (cs.GT); Logic (math.LO)
Total of 773 entries : 1-100 101-200 201-300 301-400 ... 701-773
Showing up to 100 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack